咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是141-150 订阅
排序:
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Lihao Sun, Haijian Sun, Jin Parasuraman, Ramviyas Ye, Yinghui Hu, Rose Qingyang The School of Electrical and Computer Engineering University of Georgia AthensGA United States The School of Computing University of Georgia AthensGA United States Shanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China The Electrical and Computer Engineering Department Utah State University LoganUT United States
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
BERT-based Sentiment Analysis of Chinese Online Social Movements  27
BERT-based Sentiment Analysis of Chinese Online Social Movem...
收藏 引用
27th International Conference on Automation and computing, ICAC 2022
作者: Li, Hao Ding, Yulong Jiang, Jie Deng, Peng Yuan, Diping Yang, Shuang-Hua Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China Southern University of Science and Technology Shenzhen Key Laboratory of Future Industrial Internet Safety and Security Shenzhen China Southern University of Science and Technology Academy for Advanced Interdisciplinary Studies Shenzhen China Shenzhen Urban Public Safety and Technology Institute Shenzhen China Ministry of Emergency Management Key Laboratory of Urban Safety Risk Monitoring and Early Warning Shenzhen China
Online social movements are a group of netizens with the same or similar purpose, spontaneously discussing and disseminating certain information, trying to attract more people to participate, and creating a public opi... 详细信息
来源: 评论
Efficient Graph Neural Network Driven Recurrent Reinforcement Learning for GNSS Position Correction  36
Efficient Graph Neural Network Driven Recurrent Reinforcemen...
收藏 引用
36th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2023
作者: Zhao, Haoli Tang, Jianhao Li, Zhenni Wu, Zhuoyu Xie, Shengli Wu, Zhaofeng Liu, Ming Kumara, Banage T.G.S. School of Automation Guangdong University of Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Guangzhou510006 China Key Laboratory of Intelligent Detection and The Internet of Things in Manufacturing Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China Techtotop Microelectronics Technology Co. Ltd. Guangzhou510000 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Computing and Information Systems Sabaragamuwa University of Sri Lanka Belihuloya Sri Lanka
With the wide applications of the Global Navigation Satellite System (GNSS) in autonomous driving scenarios, the demand for high-precision positioning of navigation systems has increased dramatically in complex multip...
来源: 评论
How Hard is Takeover in DPoS Blockchains? Understanding the security of Coin-based Voting Governance
arXiv
收藏 引用
arXiv 2023年
作者: Li, Chao Palanisamy, Balaji Xu, Runhua Duan, Li Liu, Jiqiang Wang, Wei Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh Pittsburgh United States School of Computer Science and Engineering Beihang University Beijing China
Delegated-Proof-of-Stake (DPoS) blockchains, such as EOSIO, Steem and TRON, are governed by a committee of block producers elected via a coin-based voting system. We recently witnessed the first de facto blockchain ta... 详细信息
来源: 评论
Protecting Personalized Trajectory with Differential Privacy under Temporal Correlations
arXiv
收藏 引用
arXiv 2024年
作者: Cao, Mingge Zhu, Haopeng Min, Minghui Li, Yulu Li, Shiyin Zhang, Hongliang Han, Zhu School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of CyberScience and Engineering Wuhan University Wuhan430072 China School of Electronics Peking University Beijing100871 China Department of Electrical and Computer Engineering University of Houston HoustonTX77004 United States
Location-based services (LBSs) in vehicular ad hoc networks (VANETs) offer users numerous conveniences. However, the extensive use of LBSs raises concerns about the privacy of users’ trajectories, as adversaries can ... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Optimizing Multi-DNN Inference on Mobile Devices through Heterogeneous Processor Co-Execution
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Yunquan Zhang, Zhiguo Donta, Praveen Kumar Dehury, Chinmaya Kumar Wang, Xiujun Niyato, Dusit Zhang, Qiyang School of Computer Science and Technology Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Ma’anshan243032 China Computer Science and Technology Anhui University of Technology Anhui Ma’anshan243032 China Department of Computer and Systems Sciences Stockholm University Stockholm106 91 Sweden Institute of Computer Science University of Tartu IISER Berhampur India College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Computer Science School Peking University Beijing100876 China
Deep Neural Networks (DNNs) are increasingly deployed across diverse industries, driving a growing demand to enable their capabilities on mobile devices. However, existing mobile inference frameworks are often rely on... 详细信息
来源: 评论
HD-Bind: Encoding of Molecular Structure with Low Precision, Hyperdimensional Binary Representations
arXiv
收藏 引用
arXiv 2023年
作者: Jones, Derek Allen, Jonathan E. Zhang, Xiaohua Khaleghi, Behnam Kang, Jaeyoung Xu, Weihong Moshiri, Niema Rosing, Tajana S. Department of Computer Science and Engineering University of California La Jolla San DiegoCA United States Global Security Computing Applications Division Lawrence Livermore National Laboratory LivermoreCA United States Biosciences and Biotechnology Division Lawrence Livermore National Laboratory LivermoreCA United States
Purpose: Publicly available collections of drug-like molecules have grown to comprise 10s of billions of possibilities in recent history due to advances in chemical synthesis (i.e. combinatorial chemistry). Traditiona... 详细信息
来源: 评论
Training of Spiking Neural Network joint Curriculum Learning Strategy
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Lingling Chu, Jielei Gong, Zhiguo Li, Tianrui The School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China The State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China
Starting with small and simple concepts, and gradually introducing complex and difficult concepts is the natural process of human learning. Spiking Neural Networks (SNNs) aim to mimic the way humans process informatio... 详细信息
来源: 评论